From POTS to VoP2P: Step 1. P2P Voice Applications. Renato Lo Cigno

Size: px
Start display at page:

Download "From POTS to VoP2P: Step 1. P2P Voice Applications. Renato Lo Cigno"

Transcription

1 Advanced Networking P2P Voice Applications Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg The Client/Server model in conversationsl communications User-plan communication is nearly always in direct mode, i.e., logically it is P2P C/S is used in traditional telephone networks (also over IP) for look-up and signaling This requires a very expensive network of servers and resources it s just like calling always a 12** number instead of looking in your address book! Advanced Networking VoIP From POTS to VoP2P: Step 1 H.323 Tries to reproduce the traditional telephony over a packet, IP-based network Adds services that are not conceivable in traditional telephony (e.g. voice-web integration) Advanced Networking VoIP

2 From POTS to VoP2P: Step 2 SIP Has the standard internet philosophy Move service logic and intelligence in terminals Distributed and flexible (indeed, SIP goes far beyond telephony) Security problems Advanced Networking VoIP From POTS to VoP2P: Step 3 (Nearly) Server-Less systems Are a transition from the C/S model, which is still rooted in H.323 and SIP) to a service model where each terminal tries to be as autonomous as possible with a flexible hierarchy for seracing services and userse (DNS like)... The P2P paradigm is the ending point. Without a service provider P2P systems are open and closed at the same time: anybody can be part of a system, but different systems do not talk one another However a communication service either has a monopoly (protocols, formats, syntax like IP) or there are gateways to cross different service domains Advanced Networking VoIP VoP2P Standardization Many approaches: An interest forum Pilot products A Task Force IETF talking to an ITU group talking with But indeed looking into the problem SIP is compatible with a P2P model Just substitute Registrars and Proxys with distributed data-bases and distributed search engines If the idea is a win-win scenario some idea will be the winner not necessarily SIPeer Advanced Networking VoIP

3 SIPeer Goals P2P standardization project based on SIP primitives 0-configuration Audio and messaging Backward compatible sith standard SIP systems Use existing DHT (Distributed Hash Tables) systems Advanced Networking VoIP Users Search Without REGISTER The key is computed based on the user ID Nodes enter the P2P overlay with their user ID One node One user alice= bob=12 With REGISTER The users REGISTER with some nodes responsible for its key Periodic refresh Enabled off-line message exchange REGISTER alice= REGISTER bob=12 sam= Advanced Networking VoIP Design alternatives servers clients DHTs are located on distributed, low-cost servers Hierarchical approach: standard, but stable and powerful nodes maintain the DHT similar to skype Advanced Networking VoIP

4 P2P real-time: Users perspective Ease of usage No user configuration required Working across all networking environments Network Address Translators (NATs) Firewalls (FWs) P2P real-time applications are not standard-based but they just work Different user experience with respect to standardbased real-time applications e.g. H.323-based or SIP-based Advanced Networking VoIP Identification of issues with P2P SIP Goal Identify potential issues of SIP-based P2P communication related to Middleboxes (NAT and firewall) traversal to be considered when designing standards for a SIP-based P2P infrastructure Non-Goals Constrain a future P2P SIP architecture in any way Still we need to list potential communication steps that might raise issues Those steps are not necessary part of the final SIPbased P2P solution Suggest NAT traversal methods to be selected for P2P solution Advanced Networking VoIP Potential Communication Steps Steps considered middlebox detection registration search for relays address lookup call setup call termination Not all steps might be necessary Several steps may be combined into one Advanced Networking VoIP

5 Middlebox Detection Detect Middleboxes on the signaling path on the data path Communication means detection for registration incoming / outgoing signaling data streaming to and from other terminals or relays Checks to be performed sending and receiving UDP packets opening incoming and outgoing TCP connections use of certain fixed port numbers the option to relay or tunnel signaling messages and streamed data NAT parameter detection full cone, half cone, etc Advanced Networking VoIP Registration Authentication of the user Notification of communication capability and willingness Registration of contact parameters Notification of service provisioning capability and willingness Advanced Networking VoIP Further Steps Search and Connect Relay Candidate relays may be suggested by infrastructure Address Lookup Per-call lookup Buddy list lookup Connection Establishment and Termination Advanced Networking VoIP

6 Middlebox Traversal Methods Tunneling in highly restricted environments only controversial: HTTP and DNS tunneling are not legitimate TURN could be OK Network-initiated Middlebox Signaling not the right choice for P2P SIP Terminal-initiated Middlebox Signaling several methods known Advanced Networking VoIP Terminal-initiated Middlebox Signaling Standards STUN (IETF RFC3489) UPnP (UPnP Forum) SOCKS (IETF RFC 1928) RSIP (IETF RFC 3103) Under development STUN update (IETF behave WG) ICE (IETF mmusic WG) NSIS (IETF nsis WG) Middlebox traversal using relays STUN relay (previously TURN) (IETF mmusic WG) Advanced Networking VoIP SIP-unrelated middlebox detection beyond UDP SIP-related terminal reachability communication service requirements communication service offers Open Issues for SIP-based P2P The relevance of these issues strongly depends on the choice of P2P architecture Advanced Networking VoIP

7 Middlebox Detection Beyond UDP Limited or no middlebox detection for TCP and DCCP (Datagram Congestion Control Protocol) available Middlebox signaling for TCP is covered by UPnP, SOCKS, RSIP, NSIS TCP considered for signaling and for data Several SIP-signaled services use TCP RTP over TCP used when UDP is blocked Might get solved partially by ICE TCP still in early state Advanced Networking VoIP Terminal Reachability Relevance depends on registration and relay detection process Terminal might need to register first and then find and connect to a relay in order to be reachable In between these two steps it would be reachable for signaling but unreachable for data transmission and should be registered as such Currently, the SIP protocol does not provide explicit means for signaling such a state Advanced Networking VoIP Communication Service Requirement The terminal might need to express its needs for relaying signaling messages lookup requests data streams Infrastructure nodes might need to suggest relays to be used by terminal For both, request and suggestion, signaling means are required Extension Header Field for Service Route Discovery During Registration (RFC 3608) might offer means Advanced Networking VoIP

8 Communication Service Offering A terminal in an unrestricted (or just slightly restricted) environment might be able (and the user willing) to offer services to other peers, such as relay services and lookup services Currently, the SIP protocol does not provide explicit means for signaling such offers Advanced Networking VoIP P2P SIP: how to locate peers? Basic idea is that what you are looking for has an identifier Locate items in the overlay based on the identifier Distributed Hash Table (DHT), Content Addressable Networks (CAN) Since everything has its place, eliminate false negatives Since you can go (close to) directly to the item you want, more efficient Advanced Networking VoIP Applying this to SIP Use pure Distributed Hash Tables (DHT) to find the other UAs Problems currently no DHT standardized some firewalls block DHT traffic as file sharing Use DHT for location, but implemented as SIP messages Essentially, use DHT as another registration/location mechanism Use standard SIP to signal once resources are located Advanced Networking VoIP

9 Problems with P2P SIP Like most things SIP, NATs Same problems, plus some new ones Super nodes? Security Sybil attacks DoS (through traffic and true denial) Encryption Information leakage Choosing node locations to divert/block Advanced Networking VoIP Advanced Networking Skype Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Skype characteristics Skype is a well known P2P program for real time communications Voice calls Video (from version 2.0) File sharing and instant messaging when in a call Seems to work with no problems in all network conditions compared to similar P2P applications One of the reasons of its success is its ability to work in network scenarios with middleboxes such as firewalls and Network Address Translators (NATs) usually, this is a problem for P2P applications Advanced Networking VoIP

10 Skype overlay network network structure entities involved Skype function analysis Lesson learned Skype security analysis Binary Network protocol Skype authentication Traffic encryption How Skype works Advanced Networking VoIP Skype overlay network (I) Skype network relies on distributed nodes: Skype Clients (SCs) Supernodes (SNs) Advanced Networking VoIP Skype overlay network (II) Although there are also centralized entities: HTTP Server Login Server Advanced Networking VoIP

11 Skype overlay network (III) Skype Client used to place voice calls and send instant messages connection to skype network possible through a supernode (SN) connection with the SN (via TCP) maintained for the whole time the client is on-line client configuration and SN addresses are stored locally and refreshed periodically to maintain a coherent view of Skype network Advanced Networking VoIP Skype overlay network (IV) Supernode Normal Skype Client that can accepts incoming TCP connections, with enough CPU, memory and bandwidth There are also a number of default Supernodes, used to increase network robustness and stability Advanced Networking VoIP Skype overlay network (V) Servers Login server ensures that names are unique across Skype namespace. Also central point for authentication HTTP Server used by clients to check for updates Advanced Networking VoIP

12 Topology SSK login communication default connection Advanced Networking VoIP Topology: calls Supernodes communicate directly... Advanced Networking VoIP Topology: calls... also with normal peers Advanced Networking VoIP

13 Topology: calls normal nodes require a supernode intermediation (relaying) Advanced Networking VoIP Some caratteristics CODECs Default is a wideband (8 khz-16khz sampling) resulting in a transmission rate of 40 kbit/s in each direction (140 pck/s with payload of 67 bytes) Quality in normal conditions is very good, much better than PCM telephony No narrowband coding is provided, congestion is not considered a problem generated by skype Under lab conditions over UDP the system works well even with only kbit/s; below 12 kbit/s the system cannot work Advanced Networking VoIP Some Characteristics Ports 80 (HTTP) e 443 (HTTPS) on TCP for signalin, random choice on UDP or TCP for voice Ports are announced on the P2P network Encryption All communications are AES (Advanced Encryption Standard) encoded Advanced Networking VoIP

14 Skype Encryption Authentication At login time the client generate a RSA session key and uses it to encrypt his credentials. Then encrypts the session key using the server s public key and sends this information to the login server Advanced Networking VoIP Some Characteristics Host Cache List of supernodes (IP, Port) used to make the search phase faster Roughly 200 entries dynamically updated If the host cache is void skype does not work (some defaults entry are there from the beginning) Une of the critical points for skype functioning The idea is not new to P2P networks and answer to the bootstrap problem... albeit in a naive way Advanced Networking VoIP Skype functions analysis Essentials Login Search Buddy list signaling Call establishment Advanced Networking VoIP

15 Login function Join and maintain overlay network: Interaction with central servers login server manage authentication and ensures unique names HTTP server ensures client software updates Refresh of shared.xml file stored on the client containing SNs list and parameters identifying middlebox Network tests if joining client can act as a SN Advanced Networking VoIP Login procedure At startup the client contacts the HTTP server to check for updates Sends UDP datagram to a -default SN- to refresh the list of supernodes Connects via TCP to a SN (connection maintained throughout Skype session) and exchanges info on online nodes Verify username and password via TCP with the Login server Another SN tests if client can act as a SN HTTP server? Login server Advanced Networking VoIP Login: Firewall blocks UDP Firewall prevents UDP exchange for SN list refreshing Client establishes several TCP connections with SNs to gather information, when finished all but one are torn down HTTP server Login server Advanced Networking VoIP

16 Login: Firewall blocks Login sever After connection with the SN, attempt to connect with the Login server fails Client connect to the Login using a SN as a relay HTTP server X Login server Advanced Networking VoIP Search function Procedure performed when a user wants to add someone to his buddy s list and communicate for the first time Search is performed using username as key possible since names are unique this is why there is the need for central servers Advanced Networking VoIP Search procedure User A exchanges info with its SN and gather 3 SNs addresses A query the 3 SNs via UDP asking if they know the public IP of B Once A gets the address of B authorization exchange is performed User A User B Advanced Networking VoIP

17 Search: Firewall blocks UDP Firewall blocks UDP preventing direct connection w/ the SNs or another user the SN of A communicate to B (via his SN) the address of A Both A and B establish TCP connections with the same 2 SN to exchange authorization User A User B Advanced Networking VoIP Search: Port restricted NAT Once user A gather the address of SN of B, sends a UDP query containing his external address. SN of B replies with user B external address. User A send an UDP datagram to user B external address in order to create a mapping in his NAT, anyway packet will be filtered by NAT of B User B does the same but this datagram reaches user A Once exchanged authorization a TCP connection via 2 SNs as relay is established, as depicted in previous slide User A User B Advanced Networking VoIP Search: Symmetric NAT Clients try the technique depicted for Port restricted NAT but it fails due to symmetric NAT behvior Clients exchange authorization via TCP using 2 SNs as relay X X User A User B Advanced Networking VoIP

18 Buddy list signaling Buddy list is a list of friend users Skype allow a user to know if buddies are online/offline overlay network informs buddies when user change status Advanced Networking VoIP Buddy List signaling procedure A user going on-line informs his buddies either directly using UDP or via the SNs. When going off-line, a user tear down the TCP connection with the SN. The SN informs via UDP the buddies that the user is going offline To have a confirmation buddies try to ping the user. Advanced Networking VoIP Buddy List signalling: Firewall blocking UDP Since UDP traffic is blocked, on-line/off-line signalling is performed via the SNs Advanced Networking VoIP

19 Buddy List signaling: Port restricted NAT On-line/off-line signaling is performed in a way similar to that depicted in previous slide. As a difference after the change of status, buddies query the SN of the user for confirmation. Advanced Networking VoIP Call establishment function Signaling performed using TCP connection overlay network used only if otherwise impossible Media carried over UDP when possible in case relay servers are used Advanced Networking VoIP Call establishment procedure User A wants to call user B, so he query some SNs for user B address. Once he gets user B address they exchange signaling over TCP Voice traffic carried via UDP Advanced Networking VoIP

20 Call establishment: firewall blocks UDP Signaling exchanges are performed by the SNs on behalf of the users Media exchange is performed via TCP using 4 SNs as relay Advanced Networking VoIP Call establishment: Port restricted Once User A gets the address of the SN responsible for user B he NAT queries for his address. SN informs B that user A wants to call him, and tells external address of B to A. A and B establish UDP flow using reverse hole punching They also establish TCP connection using 4 SNs as relay X Advanced Networking VoIP Call establishment: Symmetric NAT User A and B communicate their addresses via their SNs They try reverse hole punching but it won t work because of NATs restrictions To establish the media and signalling channel they will use 4 SNs as relay X X Advanced Networking VoIP

21 Lesson learned Traversal is well possible in many cases without explicit signaling to the middlebox open public access network protected enterprise networks Reverse hole punching and tunneling techniques workarounds allow Peer-to-peer communications in almost every scenario Skype only fails completely if firewall blocks TCP but in fact that is a very uncommon case Explicit middlebox signaling protocols (like IETF MIDCOM MIB, CheckPoint OPSEC, NEC s SIMCO) are still required for highly protected access network applying security policies by network operator anyway Skype will undermine many of these policies Skype tries to use IP network instead of overlay SNs can t assure constant presence avoid overlay congestion Advanced Networking VoIP Audio Conference Based on traffic mixing in one of the nodes Limited to few nodes (5-6) Works also with some nodes behind NAT/FW The mix node is elected based on it elaboration capabilities, since mixing is CPU intensive It does not need to be the conference initiator Advanced Networking VoIP Audio Conference: signaling B A C Advanced Networking VoIP

22 Audio Conference: audio flows B f(b+c) f(a+b) f(c) A f(a) C Advanced Networking VoIP

P2PSIP, ICE, and RTCWeb

P2PSIP, ICE, and RTCWeb P2PSIP, ICE, and RTCWeb T-110.5150 Applications and Services in Internet October 11 th, 2011 Jouni Mäenpää NomadicLab, Ericsson Research AGENDA Peer-to-Peer SIP (P2PSIP) Interactive Connectivity Establishment

More information

Analysis and Signature of Skype VoIP Session Traffic

Analysis and Signature of Skype VoIP Session Traffic Ensimag-4MMSR 2011-2012 Student seminars Analysis and Signature of Skype VoIP Session Traffic Sven Ehlert Sandrine Petgang Fraunhofer FOKUS, Berlin, Germany July 25th, 2006 Students :Amine.Boukioud@ensimag.fr

More information

Department of Computer Science. Burapha University 6 SIP (I)

Department of Computer Science. Burapha University 6 SIP (I) Burapha University ก Department of Computer Science 6 SIP (I) Functionalities of SIP Network elements that might be used in the SIP network Structure of Request and Response SIP messages Other important

More information

Network Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example

Network Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example Contents Network Address Translation (NAT) 13.10.2008 Prof. Sasu Tarkoma Overview Background Basic Network Address Translation Solutions STUN TURN ICE Summary What is NAT Expand IP address space by deploying

More information

Network Address Translators (NATs) and NAT Traversal

Network Address Translators (NATs) and NAT Traversal Network Address Translators (NATs) and NAT Traversal Ari Keränen ari.keranen@ericsson.com Ericsson Research Finland, NomadicLab Outline Introduction to NATs NAT Behavior UDP TCP NAT Traversal STUN TURN

More information

Secure Telephony Enabled Middle-box (STEM)

Secure Telephony Enabled Middle-box (STEM) Report on Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen 04/14/2003 Dr. Mark Stamp - SJSU - CS 265 - Spring 2003 Table of Content 1. Introduction 1 2. IP Telephony Overview.. 1 2.1 Major Components

More information

Internet Networking recitation #

Internet Networking recitation # recitation # UDP NAT Traversal Winter Semester 2013, Dept. of Computer Science, Technion 1 UDP NAT Traversal problems 2 A sender from the internet can't pass a packet through a NAT to a destination host.

More information

Network Address Translation (NAT) Background Material for Overlay Networks Course. Jan, 2013

Network Address Translation (NAT) Background Material for Overlay Networks Course. Jan, 2013 Network Address Translation (NAT) Background Material for Overlay Networks Course Jan, 2013 Prof. Sasu Tarkoma University of Helsinki, Department of Computer Science Contents Overview Background Basic

More information

Unit 8 Peer-to-Peer Networking

Unit 8 Peer-to-Peer Networking Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System

More information

Application Notes for Configuring SIP Trunking between the Skype SIP Service and an Avaya IP Office Telephony Solution Issue 1.0

Application Notes for Configuring SIP Trunking between the Skype SIP Service and an Avaya IP Office Telephony Solution Issue 1.0 Application Notes for Configuring SIP Trunking between the Skype SIP Service and an Avaya IP Office Telephony Solution Issue 1.0 Abstract These Application Notes describe the steps to configure trunking

More information

P2PSIP Draft Charter. Dean Willis March 2006

P2PSIP Draft Charter. Dean Willis March 2006 P2PSIP Draft Charter Dean Willis March 2006 Purpose The purpose of the Peer-to-Peer (P2P) Session Initiation Protocol working group (P2PSIP WG) is to develop guidelines and mechanisms for the use of the

More information

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach Chapter 9 Multimedia Networking A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

SIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA)

SIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA) security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, 29.03.2006, Atlanta, GA (USA) 2006 SWITCH Content and Firewall and NAT Privacy / Encryption SpIT / Authentication Identity General

More information

Realtime Multimedia in Presence of Firewalls and Network Address Translation

Realtime Multimedia in Presence of Firewalls and Network Address Translation Realtime Multimedia in Presence of Firewalls and Network Address Translation Knut Omang Ifi/Oracle 9 Oct, 2017 1 Overview Real-time multimedia and connectivity Mobile users (roaming between devices) or

More information

Realtime Multimedia in Presence of Firewalls and Network Address Translation. Knut Omang Ifi/Oracle 9 Nov, 2015

Realtime Multimedia in Presence of Firewalls and Network Address Translation. Knut Omang Ifi/Oracle 9 Nov, 2015 Realtime Multimedia in Presence of Firewalls and Network Address Translation Knut Omang Ifi/Oracle 9 Nov, 2015 1 Overview Real-time multimedia and connectivity Mobile users (roaming between devices) or

More information

Network Requirements

Network Requirements GETTING STARTED GUIDE l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l

More information

Peer-to-Peer Architectures and Signaling. Agenda

Peer-to-Peer Architectures and Signaling. Agenda Peer-to-Peer Architectures and Signaling Juuso Lehtinen Juuso@netlab.hut.fi Slides based on presentation by Marcin Matuszewski in 2005 Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction

More information

An Analysis of the Skype P2P Internet Telephony Protocol 王永豪 B 杜明可 B 吳治明 B

An Analysis of the Skype P2P Internet Telephony Protocol 王永豪 B 杜明可 B 吳治明 B An Analysis of the Skype P2P Internet Telephony Protocol 王永豪 B91902114 杜明可 B91902104 吳治明 B91902110 Outline Intro The Skype Network Key Components Experiment setup explained Experiment performed and results

More information

Content distribution networks

Content distribution networks Content distribution networks v challenge: how to stream content (selected from millions of videos) to hundreds of thousands of simultaneous users? v option 2: store/serve multiple copies of videos at

More information

On the Applicability of knowledge based NAT-Traversal for Home Networks

On the Applicability of knowledge based NAT-Traversal for Home Networks On the Applicability of knowledge based NAT-Traversal for Home Networks Andreas Müller, Andreas Klenk, and Georg Carle University of Tübingen, Computer Networks and Internet, Sand 13, 72076 Tübingen, Germany

More information

VoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved.

VoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved. VoIP Basics Phone Network Typical SS7 Network Architecture What is VoIP? (or IP Telephony) Voice over IP (VoIP) is the transmission of digitized telephone calls over a packet switched data network (like

More information

Latest Peer-to-Peer Technologies II Artjom Lind 1

Latest Peer-to-Peer Technologies II Artjom Lind 1 Latest Peer-to-Peer Technologies II 25.11.2009 Artjom Lind 1 Outline Last presentation Intro Peer-to-Peer SIP TCP Traversal Conclusions 25.11.2009 Artjom Lind 2 Last Presentation P2P Systems Structured

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand

More information

This is a sample chapter of WebRTC: APIs and RTCWEB Protocols of the HTML5 Real-Time Web by Alan B. Johnston and Daniel C. Burnett.

This is a sample chapter of WebRTC: APIs and RTCWEB Protocols of the HTML5 Real-Time Web by Alan B. Johnston and Daniel C. Burnett. This is a sample chapter of WebRTC: APIs and RTCWEB Protocols of the HTML5 Real-Time Web by Alan B. Johnston and Daniel C. Burnett. For more information or to buy the paperback or ebook editions, visit

More information

Technical White Paper for NAT Traversal

Technical White Paper for NAT Traversal V300R002 Technical White Paper for NAT Traversal Issue 01 Date 2016-01-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

Multimedia Networking

Multimedia Networking Multimedia Networking #2 Multimedia Networking Semester Ganjil 2012 PTIIK Universitas Brawijaya #2 Multimedia Applications 1 Schedule of Class Meeting 1. Introduction 2. Applications of MN 3. Requirements

More information

Desktop sharing with the Session Initiation Protocol

Desktop sharing with the Session Initiation Protocol Desktop sharing with the Session Initiation Protocol Willem Toorop willem.toorop@os3.nl February 25, 2009 How can application and desktop sharing, initiated by SIP, be realised in existing SIP infrastructure

More information

CDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol

CDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol CDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol Mustapha GUEZOURI LISSI/SCTIC, University of Paris XII-Val de Marne, France e-mail mguezouri@yahoo.fr and Abdelhamid MELLOUK

More information

Installation & Configuration Guide Version 1.6

Installation & Configuration Guide Version 1.6 TekConSer Installation & Configuration Guide Version 1.6 Document Revision 2.0 http://www.kaplansoft.com/ TekConSer is built by Yasin KAPLAN Read Readme.txt for last minute changes and updates which can

More information

Internet Technology 4/29/2013

Internet Technology 4/29/2013 Session Initiation Protocol (SIP) Internet Technology 14. VoIP and Traversal Paul Krzyzanowski Rutgers University Spring 2013 Dominant protocol for Voice over IP (VoIP) RFC 3261 llows a call to be established

More information

Chapter 2: Application layer

Chapter 2: Application layer Chapter 2: Application layer 2. Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming

More information

MySip.ch. SIP Network Address Translation (NAT) SIP Architecture with NAT Version 1.0 SIEMENS SCHWEIZ AKTIENGESELLSCHAFT

MySip.ch. SIP Network Address Translation (NAT) SIP Architecture with NAT Version 1.0 SIEMENS SCHWEIZ AKTIENGESELLSCHAFT s MySip.ch SIP Network Address Translation () SIP Architecture with Version 1.0 Issued by DS MS, Software house Albisriederstr. 245, CH-8047 Zurich Copyright Siemens Schweiz AG 2004 All Rights Reserved.

More information

Become a WebRTC School Qualified Integrator (WSQI ) supported by the Telecommunications Industry Association (TIA)

Become a WebRTC School Qualified Integrator (WSQI ) supported by the Telecommunications Industry Association (TIA) WSQI Certification Become a WebRTC School Qualified Integrator (WSQI ) supported by the Telecommunications Industry Association (TIA) Exam Objectives The WebRTC School Qualified Integrator (WSQI ) is designed

More information

Preface Preliminaries. Introduction to VoIP Networks. Public Switched Telephone Network (PSTN) Switching Routing Connection hierarchy Telephone

Preface Preliminaries. Introduction to VoIP Networks. Public Switched Telephone Network (PSTN) Switching Routing Connection hierarchy Telephone VoIP quality and performance issues Delay Jitter Packet loss Echo and talk overlap Approaches to maintaining VoIP quality Network-level QoS VoIP codecs VoIP applications and services Fax Emergency numbers

More information

RELOAD P2P Overlay Access Protocol. Younghan Kim Soongsil University

RELOAD P2P Overlay Access Protocol. Younghan Kim Soongsil University RELOAD P2P Overlay Access Protocol Younghan Kim Soongsil University Contents Introduction What is P2P? Why P2P-SIP? P2PSIP overlay network Architecture Operations RELOAD protocol Introduction Protocol

More information

On the Applicability of Knowledge Based NAT-Traversal for Home Networks

On the Applicability of Knowledge Based NAT-Traversal for Home Networks On the Applicability of Knowledge Based NAT-Traversal for Home Networks Andreas Müller, Andreas Klenk, and Georg Carle University of Tübingen, Computer Networks and Internet, Sand 13, 72076 Tübingen, Germany

More information

VoIP Security Threat Analysis

VoIP Security Threat Analysis 2005/8/2 VoIP Security Threat Analysis Saverio Niccolini, Jürgen Quittek, Marcus Brunner, Martin Stiemerling (NEC, Network Laboratories, Heidelberg) Introduction Security attacks taxonomy Denial of Service

More information

Network Access Transla0on - NAT

Network Access Transla0on - NAT Network Access Transla0on - NAT Foreword Those slides have been done by gathering a lot of informa0on on the net Ø Cisco tutorial Ø Lectures from other ins0tu0ons University of Princeton University of

More information

Peer-to-Peer Signalling. Agenda

Peer-to-Peer Signalling. Agenda Peer-to-Peer Signalling Marcin Matuszewski marcin@netlab.hut.fi S-38.115 Signalling Protocols Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction Peer-to-Peer (P2P) is a communications

More information

Ingate Firewall & SIParator Product Training. SIP Trunking Focused

Ingate Firewall & SIParator Product Training. SIP Trunking Focused Ingate Firewall & SIParator Product Training SIP Trunking Focused Common SIP Applications SIP Trunking Remote Desktop Ingate Product Training Common SIP Applications SIP Trunking A SIP Trunk is a concurrent

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks VoIP Jianping Pan Summer 2007 6/6/07 csc485b/586b/seng480b 1 Feedback on reading & summaries Be aware of deadlines the day before the presentation Read papers not someone else's

More information

Location Based Advanced Phone Dialer. A mobile client solution to perform voice calls over internet protocol. Jorge Duda de Matos

Location Based Advanced Phone Dialer. A mobile client solution to perform voice calls over internet protocol. Jorge Duda de Matos Location Based Advanced Phone Dialer A mobile client solution to perform voice calls over internet protocol Jorge Duda de Matos Superior Institute of Technology (IST) Lisbon, Portugal Abstract Mobile communication

More information

Installation & Configuration Guide Version 4.0

Installation & Configuration Guide Version 4.0 TekSIP Installation & Configuration Guide Version 4.0 Document Revision 6.8 https://www.kaplansoft.com/ TekSIP is built by Yasin KAPLAN Read Readme.txt for last minute changes and updates, which can be

More information

InstaVoIP Modules Embedded Web Pages. For Use with ControlSpace Designer User Guide. Software Version 4.4.0

InstaVoIP Modules Embedded Web Pages. For Use with ControlSpace Designer User Guide. Software Version 4.4.0 InstaVoIP Modules Embedded Web Pages For Use with ControlSpace Designer User Guide Software Version 4.4.0 Table of Contents Getting Started Overview...3 Before You Begin...3 Logging In...3 Navigating the

More information

Real-Time Communications for the Web. Presentation of paper by:cullen Jennings,Ted Hardie,Magnus Westerlund

Real-Time Communications for the Web. Presentation of paper by:cullen Jennings,Ted Hardie,Magnus Westerlund Real-Time Communications for the Web Presentation of paper by:cullen Jennings,Ted Hardie,Magnus Westerlund What is the paper about? Describes a peer-to-peer architecture that allows direct,interactive,rich

More information

The Sys-Security Group

The Sys-Security Group The Sys-Security Group Security Advisory More Vulnerabilities with Pingtel xpressa SIP-based IP Phones How one can exploit vulnerabilities with MyPingtel Portal to subvert a VoIP infrastructure which includes

More information

An Efficient NAT Traversal for SIP and Its Associated Media sessions

An Efficient NAT Traversal for SIP and Its Associated Media sessions An Efficient NAT Traversal for SIP and Its Associated Media sessions Yun-Shuai Yu, Ce-Kuen Shieh, *Wen-Shyang Hwang, **Chien-Chan Hsu, **Che-Shiun Ho, **Ji-Feng Chiu Department of Electrical Engineering,

More information

Overview Computer Networking Lecture 17: Delivering Content Peer to Peer Examples Peter Steenkiste

Overview Computer Networking Lecture 17: Delivering Content Peer to Peer Examples Peter Steenkiste Overview 15-441 15-441 Computer Networking 15-641 Lecture 17: Delivering Content Peer to Peer Examples Peter Steenkiste Fall 2014 www.cs.cmu.edu/~prs/15-441-f14 Web Consistent hashing Peer-to-peer Motivation

More information

Overview of the Session Initiation Protocol

Overview of the Session Initiation Protocol CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction

More information

X-Communicator: Implementing an advanced adaptive SIP-based User Agent for Multimedia Communication

X-Communicator: Implementing an advanced adaptive SIP-based User Agent for Multimedia Communication X-Communicator: Implementing an advanced adaptive SIP-based User Agent for Multimedia Communication Shakil Siddique, Raimund K. Ege and S. Masoud Sadjadi School of Computer Science Florida International

More information

CMSC 332 Computer Networks P2P and Sockets

CMSC 332 Computer Networks P2P and Sockets CMSC 332 Computer Networks P2P and Sockets Professor Szajda Announcements Programming Assignment 1 is due Thursday Where are we? What sorts of problems are we having? 2 Recap SMTP is the language that

More information

Multimedia Applications. Classification of Applications. Transport and Network Layer

Multimedia Applications. Classification of Applications. Transport and Network Layer Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Protocols Quality of Service and Resource Management

More information

Sai Praveen Sadhu George Mason University Fall 2014, ECE 646

Sai Praveen Sadhu George Mason University Fall 2014, ECE 646 Sai Praveen Sadhu George Mason University Fall 2014, ECE 646 VoIP - > Voice over IP Technology to send voice and mul9media over Internet Protocol. Skype is a good example of VoIP. Skype was developed in

More information

Network Requirements

Network Requirements GETTING STARTED GUIDE ALCATEL-LUCENT RAINBOW TM Network Requirements GETTING STARTED GUIDE JANVIER 2017 Author: R&D - Cloud Services Disclaimer This documentation is provided for reference purposes only.

More information

SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels

SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels Network Security - ISA 656 Voice Over IP (VoIP) Security Simple SIP ing Alice s Bob Session Initiation Protocol Control channel for Voice over IP (Other control channel protocols exist, notably H.323 and

More information

Lecture 10: TCP Friendliness, DCCP, NATs, and STUN

Lecture 10: TCP Friendliness, DCCP, NATs, and STUN Lecture 10: TCP Friendliness, DCCP, NATs, and STUN TCP Friendliness Congestion Control TCP dynamically adapts its rate in response to congestion AIMD causes flows to converge to fair goodput But how do

More information

13. Internet Applications 최양희서울대학교컴퓨터공학부

13. Internet Applications 최양희서울대학교컴퓨터공학부 13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network

More information

Lecture 12: TCP Friendliness, DCCP, NATs, and STUN

Lecture 12: TCP Friendliness, DCCP, NATs, and STUN Lecture 12: TCP Friendliness, DCCP, NATs, and STUN Congestion Control TCP dynamically adapts its rate in response to congestion AIMD causes flows to converge to fair goodput But how do losses (e.g., bit

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:

More information

Solving the Middlebox Problem

Solving the Middlebox Problem Solving the Middlebox Problem Juergen Quittek, Martin Stiemerling, Marcus Brunner Network Laboratories, Tel.: +49 6221 90511-15, Fax.: +49 6221 90511-55 Email: {quittek,stiemerling,brunner}@ccrle.nec.de

More information

NAT Traversal for VoIP

NAT Traversal for VoIP NAT Traversal for VoIP Dr. Quincy Wu National Chi Nan University Email: solomon@ipv6.club.tw.tw 1 TAC2000/2000 NAT Traversal Where is NAT What is NAT Types of NAT NAT Problems NAT Solutions Program Download

More information

[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions

[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions [MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open

More information

IPsec NAT Transparency

IPsec NAT Transparency The feature introduces support for IP Security (IPsec) traffic to travel through Network Address Translation (NAT) or Port Address Translation (PAT) points in the network by addressing many known incompatibilities

More information

1 SIP Carriers 1.1 CBeyond 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be found

More information

IETF Video Standards A review, some history, and some reflections. Colin Perkins

IETF Video Standards A review, some history, and some reflections. Colin Perkins IETF Video Standards A review, some history, and some reflections Colin Perkins Internet Engineering Task Force The goal of the IETF is to make the Internet work better Technical development of protocol

More information

Voice over IP (VoIP)

Voice over IP (VoIP) Voice over IP (VoIP) David Wang, Ph.D. UT Arlington 1 Purposes of this Lecture To present an overview of Voice over IP To use VoIP as an example To review what we have learned so far To use what we have

More information

Guide to TCP/IP, Third. Chapter 6: Basic TCP/IP Services

Guide to TCP/IP, Third. Chapter 6: Basic TCP/IP Services Guide to TCP/IP, Third Edition Chapter 6: Basic TCP/IP Services Objectives Understand how TCP/IP Application layer protocols and services work Explain the capabilities, message types, and request/reply

More information

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017 CSC 401 Data and Computer Communications Networks Protocol Layers, Security Sec:1.5-1.6 Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017 Outline Computer Networks and the Internet (Ch 1) 1.1

More information

Journal of Information, Control and Management Systems, Vol. X, (200X), No.X SIP OVER NAT. Pavel Segeč

Journal of Information, Control and Management Systems, Vol. X, (200X), No.X SIP OVER NAT. Pavel Segeč SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza.sk Abstract Session Initiation Protocol is one of key IP communication

More information

Peer-to-Peer Connectivity Using Firewall and Network Address Translator Traversal. R. Naber

Peer-to-Peer Connectivity Using Firewall and Network Address Translator Traversal. R. Naber Peer-to-Peer Connectivity Using Firewall and Network Address Translator Traversal R. Naber April 22, 2005 Peer-to-Peer Connectivity Using Firewall and Network Address Translator Traversal Research Assignment

More information

Experimental Study of Skype. Skype Peer-to-Peer VoIP System

Experimental Study of Skype. Skype Peer-to-Peer VoIP System An Experimental Study of the Skype Peer-to-Peer VoIP System Saikat Guha (Cornell) Neil Daswani (Google) Ravi Jain (Google) IPTPS 2006 About Skype Voice over IP (VoIP) 50 million users Valued at $2.6 billion

More information

Outline. Goals of work Work since Atlanta Extensions Updates Made Open Issues Ad-hoc meeting & Next Teleconference Links

Outline. Goals of work Work since Atlanta Extensions Updates Made Open Issues Ad-hoc meeting & Next Teleconference Links Update of RTSP draft-ietf-mmusic-rfc2326bis-03.txt Authors: Henning Schulzrinne / Columbia University Robert Lanphier / Real Networks Magnus Westerlund / Ericsson (Presenting) Anup Rao / Cisco Outline

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

1 SIP Carriers. 1.1 LightBound Warnings Vendor Contact Vendor Web Site:

1 SIP Carriers. 1.1 LightBound Warnings Vendor Contact Vendor Web Site: 1 SIP Carriers 1.1 LightBound 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be found

More information

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

Internet Protocol Stack! Principles of Network Applications! Some Network Apps (and Their Protocols)! Application-Layer Protocols! Our goals:! Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams

More information

Patton Electronics Co Rickenbacker Drive, Gaithersburg, MD 20879, USA tel: fax:

Patton Electronics Co Rickenbacker Drive, Gaithersburg, MD 20879, USA tel: fax: Patton Electronics Co. www.patton.com 7622 Rickenbacker Drive, Gaithersburg, MD 20879, USA tel: +1 301-975-1000 fax: +1 301-869-9293 2012 Inalp Networks AG, Niederwangen, Switzerland All Rights Reserved.

More information

Congestion Control. Lecture 12: TCP Friendliness, DCCP, NATs, and STUN. Chiu Jain Phase Plots. Fair A=B. Responding to Loss. Flow B rate (bps) t 1 t 3

Congestion Control. Lecture 12: TCP Friendliness, DCCP, NATs, and STUN. Chiu Jain Phase Plots. Fair A=B. Responding to Loss. Flow B rate (bps) t 1 t 3 Congestion Control Lecture 12: TCP Friendliness, DCCP, s, and STUN TCP dynamically adapts its rate in response to congestion AIMD causes flows to converge to fair goodput But how do losses (e.g., bit errors)

More information

Implementing SBC Firewall Traversal and NAT

Implementing SBC Firewall Traversal and NAT CHAPTER 15 The Session Border Controller (SBC) enables voice over IP (VoIP) signaling and media to be received from and directed to a device behind a firewall and NAT (Network Address Translator) at the

More information

OneXS will provide users with a reference server (IP, FQDN, or other means to connect to the service). This must be obtained before setup can begin.

OneXS will provide users with a reference server (IP, FQDN, or other means to connect to the service). This must be obtained before setup can begin. 1 SIP Carriers 1.1 OneXS 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be found

More information

Configuring Multi-Tenants on SIP Trunks

Configuring Multi-Tenants on SIP Trunks The feature allows specific global configurations for multiple tenants on SIP trunks that allow differentiated services for tenants. allows each tenant to have their own individual configurations. The

More information

A SIMPLE INTRODUCTION TO TOR

A SIMPLE INTRODUCTION TO TOR A SIMPLE INTRODUCTION TO TOR The Onion Router Fabrizio d'amore May 2015 Tor 2 Privacy on Public Networks Internet is designed as a public network Wi-Fi access points, network routers see all traffic that

More information

VPN-1 Power/UTM. Administration guide Version NGX R

VPN-1 Power/UTM. Administration guide Version NGX R VPN-1 Power/UTM Administration guide Version NGX R65.2.100 January 15, 2009 2003-2009 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by

More information

Secure Networking with NAT Traversal for Enhanced Mobility

Secure Networking with NAT Traversal for Enhanced Mobility Secure Networking with NAT Traversal for Enhanced Mobility Lubomir Cvrk 1, Vit Vrba 1 1 Brno University of Technology, Dept. of Telecommunications, Purkynova 118, 61200 Brno, Czech Republic {cvrk, vrba}@westcom.cz

More information

Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide

Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide 28 May 2009 3Com VCX Connect Solution SIP Trunking Table of Contents 1 3COM VCX CONNECT AND INGATE... 1 1.1 SIP TRUNKING SUPPORT...

More information

Avaya PBX SIP TRUNKING Setup & User Guide

Avaya PBX SIP TRUNKING Setup & User Guide Avaya PBX SIP TRUNKING Setup & User Guide Nextiva.com (800) 285-7995 2 P a g e Contents Description... 3 Avaya IP PBX Configuration... 3 Licensing and Physical Hardware... 4 System Tab Configuration...

More information

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP).

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP). This chapter provides an overview of the Session Initiation Protocol (SIP). Information About SIP, page 1 How SIP Works, page 4 How SIP Works with a Proxy Server, page 5 How SIP Works with a Redirect Server,

More information

APP NOTES Onsight Connect Network Requirements

APP NOTES Onsight Connect Network Requirements APP NOTES Onsight Connect Network Requirements May 2017 Table of Contents 1. Overview... 4 1.1 Onsight Connect Solution Architecture... 4 1.2 Three Stages of Onsight Connectivity... 5 2. Web (HTTP/S) Proxy

More information

APP NOTES TeamLink and Firewall Detect

APP NOTES TeamLink and Firewall Detect APP NOTES TeamLink and Firewall Detect May 2017 Table of Contents 1. Overview... 4 1.1 When is TeamLink Used?... 4 1.2 Onsight Connect Solution Architecture... 4 1.3 Three Stages of Onsight Connectivity...

More information

BandTel SIP Trunk Setup

BandTel SIP Trunk Setup DSX BandTel SIP Trunk Setup February 24, 2011 Issue 1.00 NEC Corporation of America 4 Forest Parkway, Shelton, CT 06484 Copyright 2011 NEC Corporation of America 6535 N. State Highway 161 Irving, TX 75039-2402

More information

Application Notes for OneAccess-Telstra Business SIP with Avaya IP Office Release 11 SIP Trunking - Issue 1.0

Application Notes for OneAccess-Telstra Business SIP with Avaya IP Office Release 11 SIP Trunking - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for OneAccess-Telstra Business SIP with Avaya IP Office Release 11 SIP Trunking - Issue 1.0 Abstract These Application Notes illustrate a sample

More information

RP-FSO522 2-Line FXO, 2-Line FXS SIP IP Gateway. Feature

RP-FSO522 2-Line FXO, 2-Line FXS SIP IP Gateway. Feature RP-FSO522 2-Line FXO, 2-Line FXS SIP IP Gateway RP-FSO522 is an 2-Line FXO plus 2-Line FXS gateway with SIP protocol IP device which allows to connect 2 Lines of analog PSTN telephone line and connect

More information

NAT Tutorial. Dan Wing, IETF77, Anaheim March 21, 2010 V2.1

NAT Tutorial. Dan Wing, IETF77, Anaheim March 21, 2010 V2.1 NAT Tutorial Dan Wing, dwing@cisco.com IETF77, Anaheim March 21, 2010 V2.1 1 Agenda NAT and NAPT Types of NATs Application Impact Application Layer Gateway (ALG) STUN, ICE, TURN Large-Scale NATs (LSN,

More information

TT11 VoIP Router 1FXS/1FXO TA User Guide

TT11 VoIP Router 1FXS/1FXO TA User Guide TT11 VoIP Router 1FXS/1FXO TA User Guide Page 1 Table of Contents: 1.0 Introduction... 3 2.0 Package Contents... 3 3.0 Summary of LED & Connector Descriptions... 4 3.1 The Front LEDs... 4 3.2 The Rear

More information

BandTel SIP Trunk Setup

BandTel SIP Trunk Setup DSX BandTel SIP Trunk Setup April 22, 2011 Issue 1.02 NEC Corporation of America 4 Forest Parkway, Shelton, CT 06484 Copyright 2011 NEC Corporation of America 6535 N. State Highway 161 Irving, TX 75039-2402

More information

VoipSwitch User Portal for Rich Communiation Suite RCS features, HTML 5, WebRTC powered FOR DESKTOP AND MOBILES

VoipSwitch User Portal for Rich Communiation Suite RCS features, HTML 5, WebRTC powered FOR DESKTOP AND MOBILES VoipSwitch User Portal for Rich Communiation Suite RCS features, HTML 5, WebRTC powered FOR DESKTOP AND MOBILES Overview The VoipSwitch User Portal (VUP) is a self-care customer portal for VoIP service

More information

Application Notes for Configuring Tidal Communications tnet Business VoIP with Avaya IP Office using SIP Registration - Issue 1.0

Application Notes for Configuring Tidal Communications tnet Business VoIP with Avaya IP Office using SIP Registration - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Tidal Communications tnet Business VoIP with Avaya IP Office using SIP Registration - Issue 1.0 Abstract These Application Notes

More information

The trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-udp.pcap

The trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-udp.pcap Lab Exercise UDP Objective To look at the details of UDP (User Datagram Protocol). UDP is a transport protocol used throughout the Internet as an alternative to TCP when reliability is not required. It

More information

MITEL SIP CoE Technical. Configuration Note. Configure Mitel MiVoice Office 6.1 SP1 PR2 for use with IntelePeer SIP Trunking. SIP CoE XXX

MITEL SIP CoE Technical. Configuration Note. Configure Mitel MiVoice Office 6.1 SP1 PR2 for use with IntelePeer SIP Trunking. SIP CoE XXX MITEL SIP CoE Technical Configuration Note Configure Mitel MiVoice Office 6.1 SP1 PR2 for use with IntelePeer SIP Trunking SIP CoE 12-4940-00XXX NOTICE The information contained in this document is believed

More information